Paul Rosenzweig
  • Home
  • About
    • Public PGP
  • Consulting
  • Law
  • Publications
  • Media
  • Contact
Select Page
Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program

Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program

by Paul Rosenzweig | May 12, 2016 | Cybersecurity, National Security

Section 702 of the Foreign Intelligence Surveillance Act (FISA) will, in its current form, come up for reauthorization in 2017. Broadly speaking, the Section 702 program targets non-U.S. persons reasonably believed to be located outside the United…
How Concerned Should We Be about IoT Vulnerability?

How Concerned Should We Be about IoT Vulnerability?

by Paul Rosenzweig | Feb 11, 2016 | Artificial intelligence, Cybersecurity, Data Privacy, National Security

In 2006, when the Office of the Director of National Intelligence provided its first “Annual Threat Asssessment” top billing went to the “Global Jihadist Threat.” Rounding out the top three concerns, Director Negroponte mentioned the then-ongoing…
President Obama’s National Cybersecurity Plan

President Obama’s National Cybersecurity Plan

by Paul Rosenzweig | Feb 8, 2016 | Cybersecurity, National Security

In connection with today’s budget roll-out, President Obama has announced a National Cybersecurity Plan. Highlights of his national action plan include the following: In connection with today’s budget roll-out, President Obama has announced a…
Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702 Program

Encryption and Law Enforcement Special Access: The U.S. Should Err on the Side of Stronger Encryption

by Paul Rosenzweig | Sep 3, 2015 | Cybersecurity, Homeland Security, National Security

A debate is currently raging between FBI Director James Comey and much of the technology community over whether law enforcement should have some sort of special access, which has been called a backdoor, into encrypted communications and data.[1] In…
How Concerned Should We Be about IoT Vulnerability?

Users Weigh in on What Database the PLA Should Hack Next

by Paul Rosenzweig | Jul 30, 2015 | Cybersecurity, Homeland Security, National Security

The results are in. Lawfare’s “Name that Database” contest is now closed. All we can say is that Lawfare readers are a remarkably creative—and scary—bunch of folks. Some of these ideas are really quite spectacular. The results are in. Lawfare’s “Name…
How Concerned Should We Be about IoT Vulnerability?

Unclassified Databases for the Chinese Part II

by Paul Rosenzweig | Jul 26, 2015 | Cybersecurity, National Security

Ben’s list of unclassified databases for the Chinese to steal is just too much fun not to follow up. At the risk of piling on, here are a few more that a good Chinese spy ought to look at: Ben’s list of unclassified databases for the Chinese to steal…
« Older Entries
Next Entries »

Recent Articles

  • How to Fix DHS March 22, 2026
  • Anonymous Money March 16, 2026
  • DOD v. Anthropic February 25, 2026
  • Thoughts on American Tech Complicity December 16, 2025
  • Domestic Cyber Operations November 17, 2025
  • Cyber Operations on Domestic Networks Redux November 16, 2025
  • Security by Design in Perspective September 21, 2025
  • Europe and US Tech Dependency July 28, 2025
  • The Security by Design Project: An Annotated Review June 29, 2025
  • The Future of American Cybersecurity June 23, 2025

Article Categories

  • Artificial intelligence (15)
  • Cybersecurity (420)
  • Data Privacy (12)
  • Donald Trump (35)
  • Election Security (20)
  • Homeland Security (134)
  • National Security (134)
  • Privacy Statement
  • X
  • Instagram
Copyright© 2025  | Paul Rosenzweig, Esq. |  Email:info@paulrosenzweigesq.com  |  Website by PlanetLink